Solved

what is the difference between in role seize and role transfer and how we can perform this task?

Posted on 2009-04-04
3
1,180 Views
Last Modified: 2012-05-06
what is the difference between in role seize and role transfer and how can we  perform these task?
Can you explain step by step.
0
Comment
Question by:chandar_bhandari
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Expert Comment

by:kchat
ID: 24070414
0
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
ID: 24070794

FSMO roles are one of the fundamental components of Active Directory; the define five (5) operations which can only ever be performed at one DC at any one time. With the exception of these roles, Active Directory for the most part is multi-master and any action can be taken against any DC.

An FSMO role TRANSFER is the graceful movement of the roles from a live, working DC to another live DC. This could be performed in any situation - such as if you build a new DC and wish to migrate Active Directory over, or for any other reason. During the process, the current DC holding the role(s) is updated, so it becomes aware it is no longer the role holder.

An FSMO role SEIZE is when a DC holding one (or more) roles has failed and will never return to the network. The roles need to be re-located to a live, working DC. A transfer operation will not succeed because the old DC is not contactable; the roles must therefore be forcefully seized. In other words, it's a transfer operation, but the old DC is never notified the role holders have changed.

If you perform a seizure of the FSMO roles from a DC, you need to ensure two things: the current holder is actually dead and offline, and that the old DC will NEVER return to the network. If you do an FSMO role Seize and then bring the previous holder back online, you'll have a problem.

-Matt
0
 

Author Comment

by:chandar_bhandari
ID: 24135131
thanks .. Matt
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Problem: You created a new custom form in Outlook for your contacts (added fields, deleted fields, changed the layout of fields, whatever) and made it the default form for contacts. The good news is that all new contacts will utilize the new form. T…
The System Center Operations Manager 2012, known as SCOM, is a part of the Microsoft system center product that provides the user with infrastructure monitoring and application performance monitoring. SCOM monitors:   Windows or UNIX/LinuxNetwo…
The viewer will learn how to simulate a series of sales calls dependent on a single skill level and learn how to simulate a series of sales calls dependent on two skill levels. Simulating Independent Sales Calls: Enter .75 into cell C2 – “skill leve…
The viewer will learn how to create a normally distributed random variable in Excel, use a normal distribution to simulate the return on an investment over a period of years, Create a Monte Carlo simulation using a normal random variable, and calcul…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question